COMPUTER SOFTWARE ISSUING

Brand Owner (click to sort) Address Description
AT THE ROOT OF ELECTRONIC COMMERCE CERTCO, INC. 55 Broad Street, Suite 22 New York NY 10004 COMPUTER SOFTWARE FOR ISSUING, USING, TRANSMITTING, RECEIVING, REGISTERING, CERTIFYING, VERIFYING, STORING, MANAGING AND RECOVERING CRYPTOGRAPHIC MATHEMATICAL VALUES USED AS KEYS AND CRYPTOGRAPHICALLY ENCODED MESSAGES;PRINTED PUBLICATIONS, NAMELY, DOCUMENTATION AND TECHNICAL MANUALS FOR COMPUTER SOFTWARE FOR ISSUING, USING, TRANSMITTING, RECEIVING, REGISTERING, CERTIFYING, VERIFYING, STORING, MANAGING AND RECOVERING CRYPTOGRAPHIC MATHEMATICAL VALUES USED AS KEYS AND CRYPTOGRAPHICALLY ENCODED MESSAGES; AND TEXT BOOKS FEATURING THE LAW AND TECHNICAL PRACTICE AND PROCEDURE OF ISSUING, USING, TRANSMITTING, RECEIVING, REGISTERING, CERTIFYING, VERIFYING, STORING, MANAGING AND RECOVERING CRYPTOGRAPHIC MATHEMATICAL VALUES USED AS KEYS AND CRYPTOGRAPHICALLY ENCODED MESSAGES;ON-LINE BANKING VIA AN ELECTRONIC COMMUNICATIONS NETWORK, INCLUDING REQUESTING AND EFFECTUATING FUNDS TRANSFERS, BILL PRESENTMENT AND PAYMENT, OFF-LINE DIGITAL PAYMENTS, AND PAYMENT FOR GOODS AND SERVICES;COMPUTER SERVICES, NAMELY, FACILITATING THE AUTHENTICATION, CONFIDENTIALITY AND AUTHORIZATION OF ELECTRONIC DOCUMENTS VIA ELECTRONIC DATA NETWORKS BY ISSUING, USING, TRANSMITTING, RECEIVING, REGISTERING, CERTIFYING, VERIFYING, STORING, MANAGING AND RECOVERING CRYPTOGRAPHIC MATHEMATICAL VALUES USED AS KEYS AND CRYPTOGRAPHICALLY ENCODED MESSAGES;
AXCES AMERICAN EXPRESS COMPANY New York NY Computer software for issuing and managing credit cards and charge cards;
CERTCO CERTCO 280 Park Avenue, 6-West New York NY 10017 computer software for issuing, using, transmitting, receiving, registering, certifying, verifying, storing, managing and recovering cryptographic mathematical values used as keys and cryptographically encoded messages;printed publications, namely, documentation and technical manuals for computer software for issuing, using, transmitting, receiving, registering, certifying, verifying, storing, managing and recovering cryptographic mathematical values used as keys and cryptographically encoded messages; and text books featuring the law and technical practice and procedure of issuing, using, transmitting, receiving, registering, certifying, verifying, storing, managing and recovering cryptographic mathematical values used as keys and cryptographically encoded messages;on-line banking via an electronic communications network, including requesting and effectuating funds transfers, bill presentment and payment, off-line digital payments, and payment for goods and services;computer services, namely, facilitating the authentication, confidentiality and authorization of electronic documents via electronic data networks by issuing, using, transmitting, receiving, registering, certifying, verifying, storing, managing and recovering cryptographic mathematical values used as keys and cryptographically encoded messages;
CERTSIGNER CERTCO, INC. 55 Broad Street, Suite 22 New York NY 10004 Computer software for issuing, using, transmitting, receiving, registering, certifying, verifying, storing, managing and recovering cryptographic mathematical values used as keys and cryptographically encoded messages;Computer services, namely, facilitating the authentication, confidentiality and authorization of electronic documents via electronic data networks by issuing, using, transmitting, receiving, registering, certifying, verifying, storing, managing and recovering cryptographic mathematical values used as keys and cryptographically encoded messages;
HID MOBILE ACCESS ASSA ABLOY AB Klarabergsviadukten 90 Stockholm SE-11164 Sweden Computer software for issuing and managing encrypted and digitally signed and authenticated identity representation data for use in the field of physical and logical access control, stored value transactions, transactions involving secure identity, and transactions involving biometric data; computer software for generating and managing secure identity representation data; mobile device software for downloading and implementing access control functionality for identity verification and access or denial of access to digital data, physical premises or computer networks; physical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels; physical and logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; integrated circuit cards and components containing programming used for access control systems; encoded smart cards containing programming used for access control systems; electronic card readers; electronic card reader/enroller, electronic RFID card and NFC enabled device readers and controllers for controlling access to a premises; near field communication (NFC) technology-enabled readers; electric locks; electronic lock assemblies; electronically operated high security lock cylinders; radio-frequency controlled locks; electronic relays; electronic switches; electronic door openers and closers; electronic door opening and closing system; electronic strikes for remote control of door ingress and egress; automatic turnstiles; automated security gates; electric gate operators;Color is not claimed as a feature of the mark.;Data lifecycle management services for others, namely, issuance, authentication and revocation of digital rights for physical and logical access control systems; digital signature authentication services for identity representation data for others, namely, data encryption and data integrity; providing for others encrypted and digitally signed and authenticated identity representation data for use in electronic physical access control and logical access control stored value transactions, transactions involving secure identity, and transactions involving biometric data, namely, issuance, and validation of digital certificates and access rights;MOBILE ACCESS;Data encryption services for identity representation data for others;
HID SIO ASSA ABLOY AB Klarabergsviadukten 90 Stockholm SE-11164 Sweden Computer software for issuing and managing encrypted and digitally signed and authenticated identity representation data for use in the field of physical and logical access control, stored value transactions, transactions involving secure identity, and transactions involving biometric data; computer software for generating and managing secure identity representation data;Data lifecycle management services for others, namely, issuance, tracking, revoking, validating and authenticating digital certificates and digital credentials; Digital signature authentication services for identity representation data for others, namely, issuance, tracking, revoking, validating and authenticating digital certificates and digital credentials; Providing for others encrypted and digitally signed and authenticated identity representation data for use in electronic physical access control and logical access control stored value transactions, transactions involving secure identity, and transactions involving biometric data, namely, issuance, tracking, revoking, validating and authenticating digital certificates and digital credentials;Data encryption services for identity representation data for others;
MOBILE ACCESS READER PROXY TECHNOLOGIES, INC. 350 TOWNSEND ST STE 260 San Francisco CA 94107 Computer software for issuing and managing encrypted and digitally signed and authenticated identity representation data for use in the field of physical and logical access control, stored value transactions, transactions involving secure identity, and transactions involving biometric data; computer software for generating and managing secure identity representation data; mobile device software for downloading and implementing access control functionality for identity verification and access or denial of access to digital data, physical premises or computer networks; physical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels; physical and logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; integrated circuit cards and components containing programming used for access control systems; encoded smart cards containing programming used for access control systems; electronic card readers; electronic card reader/enroller, electronic RFID card and NFC enabled device readers and controllers for controlling access to a premises; near field communication (NFC) technology-enabled readers; electric locks; electronic lock assemblies; electronically operated high security lock cylinders; radio-frequency controlled locks; electronic relays; electronic switches; electronic door openers and closers; electronic door opening and closing system; electronic strikes for remote control of door ingress and egress; automatic turnstiles; automated security gates; electric gate operators;Identification verification services, namely, providing authentication of personal identification information;Data encryption services;
MOBILE ACCESS SERVICE PROXY TECHNOLOGIES, INC. 350 TOWNSEND ST STE 260 San Francisco CA 94107 Computer software for issuing and managing encrypted and digitally signed and authenticated identity representation data for use in the field of physical and logical access control, stored value transactions, transactions involving secure identity, and transactions involving biometric data; computer software for generating and managing secure identity representation data; mobile device software for downloading and implementing access control functionality for identity verification and access or denial of access to digital data, physical premises or computer networks; physical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels; physical and logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; integrated circuit cards and components containing programming used for access control systems; encoded smart cards containing programming used for access control systems; electronic card readers; electronic card reader/enroller, electronic RFID card and NFC enabled device readers and controllers for controlling access to a premises; near field communication (NFC) technology-enabled readers; electric locks; electronic lock assemblies; electronically operated high security lock cylinders; radio-frequency controlled locks; electronic relays; electronic switches; electronic door openers and closers; electronic door opening and closing system; electronic strikes for remote control of door ingress and egress; automatic turnstiles; automated security gates; electric gate operators;Identification verification services, namely, providing authentication of personal identification information;Data encryption services;
MOBILE IDENTITY PROXY TECHNOLOGIES, INC. 350 TOWNSEND ST STE 260 San Francisco CA 94107 Computer software for issuing and managing encrypted and digitally signed and authenticated identity representation data for use in the field of physical and logical access control, stored value transactions, transactions involving secure identity, and transactions involving biometric data; computer software for generating and managing secure identity representation data; mobile device software for downloading and implementing access control functionality for identity verification and access or denial of access to digital data, physical premises or computer networks; physical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels; physical and logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; integrated circuit cards and components containing programming used for access control systems; encoded smart cards containing programming used for access control systems; electronic card readers; electronic card reader/enroller, electronic RFID card and NFC enabled device readers and controllers for controlling access to a premises; near field communication (NFC) technology-enabled readers; electric locks; electronic lock assemblies; electronically operated high security lock cylinders; radio-frequency controlled locks; electronic relays; electronic switches; electronic door openers and closers; electronic door opening and closing system; electronic strikes for remote control of door ingress and egress; automatic turnstiles; automated security gates; electric gate operators;Identification verification services, namely, providing authentication of personal identification information;Data encryption services;
MOBILE READER PROXY TECHNOLOGIES, INC. 350 TOWNSEND ST STE 260 San Francisco CA 94107 Computer software for issuing and managing encrypted and digitally signed and authenticated identity representation data for use in the field of physical and logical access control, stored value transactions, transactions involving secure identity, and transactions involving biometric data; computer software for generating and managing secure identity representation data; mobile device software for downloading and implementing access control functionality for identity verification and access or denial of access to digital data, physical premises or computer networks; physical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels; physical and logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; integrated circuit cards and components containing programming used for access control systems; encoded smart cards containing programming used for access control systems; electronic card readers; electronic card reader/enroller, electronic RFID card and NFC enabled device readers and controllers for controlling access to a premises; near field communication (NFC) technology-enabled readers; electric locks; electronic lock assemblies; electronically operated high security lock cylinders; radio-frequency controlled locks; electronic relays; electronic switches; electronic door openers and closers; electronic door opening and closing system; electronic strikes for remote control of door ingress and egress; automatic turnstiles; automated security gates; electric gate operators;Identification verification services, namely, providing authentication of personal identification information;Data encryption services;
PROXY MOBILE ACCESS PROXY, INC. 500 3rd Street # 245 San Francisco CA 94107 Computer software for issuing and managing encrypted and digitally signed and authenticated identity representation data for use in the field of physical and logical access control, stored value transactions, transactions involving secure identity, and transactions involving biometric data; computer software for generating and managing secure identity representation data; mobile device software for downloading and implementing access control functionality for identity verification and access or denial of access to digital data, physical premises or computer networks; physical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels; physical and logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; integrated circuit cards and components containing programming used for access control systems; encoded smart cards containing programming used for access control systems; electronic card readers; electronic card reader/enroller, electronic RFID card and NFC enabled device readers and controllers for controlling access to a premises; near field communication (NFC) technology-enabled readers; electric locks; electronic lock assemblies; electronically operated high security lock cylinders; radio-frequency controlled locks; electronic relays; electronic switches; electronic door openers and closers; electronic door opening and closing system; electronic strikes for remote control of door ingress and egress; automatic turnstiles. automated security gates; electric gate operators;Identification verification services, namely, providing authentication of personal identification information;MOBILE ACCESS;Data encryption services;
SECURE IDENTITY OBJECT ASSA ABLOY AB Klarabergsviadukten 90 Stockholm SE-11164 Sweden Computer software for issuing and managing encrypted and digitally signed and authenticated identity representation data for use in the field of physical and logical access control, stored value transactions, transactions involving secure identity, and transactions involving biometric data; computer software for generating and managing secure identity representation data;Data lifecycle management services for others, namely, issuance, tracking, revoking, validating and authenticating digital certificates and digital credentials; digital signature authentication services for identity representation data for others, namely, issuance, tracking, revoking, validating and authenticating digital certificates and digital credentials; providing for others encrypted and digitally signed and authenticated identity representation data for use in electronic physical access control and logical access control stored value transactions, transactions involving secure identity, and transactions involving biometric data, namely, issuance, tracking, revoking, validating and authenticating digital certificates and digital credentials;SECURE IDENTITY;Data encryption services for identity representation data for others;
SIO ASSA ABLOY AB Klarabergsviadukten 90 Stockholm SE-11164 Sweden Computer software for issuing and managing encrypted and digitally signed and authenticated identity representation data for use in the field of physical and logical access control, stored value transactions, transactions involving secure identity, and transactions involving biometric data; computer software for generating and managing secure identity representation data;
SMART READER PROXY TECHNOLOGIES, INC. 350 TOWNSEND ST STE 260 San Francisco CA 94107 Computer software for issuing and managing encrypted and digitally signed and authenticated identity representation data for use in the field of physical and logical access control, stored value transactions, transactions involving secure identity, and transactions involving biometric data; computer software for generating and managing secure identity representation data; mobile device software for downloading and implementing access control functionality for identity verification and access or denial of access to digital data, physical premises or computer networks; physical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels; physical and logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; integrated circuit cards and components containing programming used for access control systems; encoded smart cards containing programming used for access control systems; electronic card readers; electronic card reader/enroller, electronic RFID card and NFC enabled device readers and controllers for controlling access to a premises; near field communication (NFC) technology-enabled readers; electric locks; electronic lock assemblies; electronically operated high security lock cylinders; radio-frequency controlled locks; electronic relays; electronic switches; electronic door openers and closers; electronic door opening and closing system; electronic strikes for remote control of door ingress and egress; automatic turnstiles; automated security gates; electric gate operators;Identification verification services, namely, providing authentication of personal identification information;Data encryption services;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.